From nobody Fri Dec 27 02:17:31 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zohomail.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1503926697522289.2119182718577; Mon, 28 Aug 2017 06:24:57 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id E46142095AE47; Mon, 28 Aug 2017 06:22:12 -0700 (PDT) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 3D9AB2095DCB8 for ; Mon, 28 Aug 2017 06:22:11 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 3A101C047B73; Mon, 28 Aug 2017 13:24:50 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-116-67.phx2.redhat.com [10.3.116.67]) by smtp.corp.redhat.com (Postfix) with ESMTP id D409560A9B; Mon, 28 Aug 2017 13:24:48 +0000 (UTC) X-Original-To: edk2-devel@lists.01.org DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 3A101C047B73 Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=lersek@redhat.com From: Laszlo Ersek To: edk2-devel-01 Date: Mon, 28 Aug 2017 15:24:35 +0200 Message-Id: <20170828132436.15933-6-lersek@redhat.com> In-Reply-To: <20170828132436.15933-1-lersek@redhat.com> References: <20170828132436.15933-1-lersek@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Mon, 28 Aug 2017 13:24:50 +0000 (UTC) Subject: [edk2] [PATCH 5/6] OvmfPkg/VirtioGpuDxe: map backing store to bus master device address X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Jordan Justen , Tom Lendacky , Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" VirtioGpuDxe is a UEFI Bus driver (not a Device driver). This is because a UEFI graphics driver is expected to produce its GraphicsOutput protocol instance(s) on new child handle(s) of the video controller handle, one child handle (plus GOP) per video output (or, one child handle plus GOP per combination of multiple video outputs). In VirtioGpuDxe, we support a single VirtIo GPU head (scanout), namely head#0. This means that, with regard to a specific VirtIo GPU device, the driver may be in one of three states, at any time: [1] VirtioGpuDxe has not bound the device at all, [2] VirtioGpuDxe has bound the device, but not produced the sole child handle for head#0, [3] VirtioGpuDxe has bound the device, and produced the sole child handle for head#0, with a GOP instance on the child handle. (Which state the driver is in wrt. a given VirtIo GPU device depends on the VirtioGpuDriverBindingStart() / VirtioGpuDriverBindingStop() invocations issued by the ConnectController() / DisconnectController() boot services. In turn those come from BDS or e.g. the UEFI shell.) The concept of "current video mode" is technically tied to the GOP (i.e., the child handle, state [3] only), not the VirtIo GPU controller handle. This is why we manage the storage that backs the current video mode in our EFI_GRAPHICS_OUTPUT_PROTOCOL.SetMode() member implementation. GopSetMode() is first called *internally*, when we enter state [3] (that is, when we produce the child handle + GOP on it): VirtioGpuDriverBindingStart() [DriverBinding.c] InitVgpuGop() [DriverBinding.c] VgpuGop->Gop.SetMode() [Gop.c] When this happens, we allocate the backing store *without* having a preexistent backing store (due to no preexistent video mode and GOP). Skipping VirtIo GPU details not relevant for this patch, we just note that the backing store is exposed *permanently* to the VirtIo GPU device, with the RESOURCE_ATTACH_BACKING command. When external clients call the EFI_GRAPHICS_OUTPUT_PROTOCOL.Blt() member function -- called GopBlt() in this driver --, in state [3], the function operates on the backing store, and sends only small messages to the VirtIo GPU device. When external clients call GopSetMode() for switching between video modes -- in state [3] --, then - a new backing store is allocated and exposed to the device (attached to a new host-side VirtIo GPU resource), - head#0 is flipped to the new backing store, - on success, the ReleaseGopResources() function both detaches the previous backing store from the VirtIo GPU device, an releases it. The new backing store address and size are saved in our GOP object. (In other words, we "commit" to the new video mode.) When the DisconnectController() boot service asks us to leave state [3] -- we can leave it directly only for state [2] --, then the ReleaseGopResources() function is called on a different path: VirtioGpuDriverBindingStop() [DriverBinding.c] UninitVgpuGop() [DriverBinding.c] ReleaseGopResources() [Gop.c] In this case, the backing store being released is still in use (we're not leaving it for a new mode -- head#0 has not been flipped "away" from it), so in ReleaseGopResources() we disable head#0 first. (The ReleaseGopResources() function is called the same way on the error path in InitVgpuGop(), if the first -- internal -- VgpuGop->Gop.SetMode() call succeeds, but the rest of InitVgpuGop() fails.) Based on the above, for IOMMU-compatibility, - in GopSetMode(), don't just allocate, but also map the backing store of the nascent video mode to a device address, for bus master common buffer operation, - (the VirtioGpuAllocateZeroAndMapBackingStore() helper function introduced in the last patch takes care of zeroing internally,) - pass the device address to the VirtIo GPU device in the RESOURCE_ATTACH_BACKING command, - if GopSetMode() succeeds, save the mapping token, - if GopSetMode() fails, don't just free but also unmap the still-born backing store, - in ReleaseGopResources(), don't just free but also unmap the backing store -- which is the previous backing store if we're mode-switching, and the current backing store if we're leaving state [3]. Finally, ExitBootServices() may be called when the driver is in either state [1], [2] or [3], wrt. a given VirtIo GPU device. (Of course we are only notified in states [2] and [3].) If we get the notification in state [3], then the current video mode's backing store has to be unmapped, but not released. (We must not change the UEFI memory map.) Cc: Ard Biesheuvel Cc: Brijesh Singh Cc: Jordan Justen Cc: Tom Lendacky Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Laszlo Ersek --- OvmfPkg/VirtioGpuDxe/VirtioGpu.h | 7 +++ OvmfPkg/VirtioGpuDxe/Commands.c | 21 ++++++++ OvmfPkg/VirtioGpuDxe/Gop.c | 55 +++++++++++++------- 3 files changed, 64 insertions(+), 19 deletions(-) diff --git a/OvmfPkg/VirtioGpuDxe/VirtioGpu.h b/OvmfPkg/VirtioGpuDxe/Virtio= Gpu.h index 65b1bd6088b8..73893ccb56eb 100644 --- a/OvmfPkg/VirtioGpuDxe/VirtioGpu.h +++ b/OvmfPkg/VirtioGpuDxe/VirtioGpu.h @@ -94,80 +94,87 @@ typedef struct { struct VGPU_GOP_STRUCT { UINT64 Signature; =20 // // ParentBus points to the parent VGPU_DEV object. Never NULL. // VGPU_DEV *ParentBus; =20 // // GopName carries a customized name for // EFI_COMPONENT_NAME2_PROTOCOL.GetControllerName(). It is expressed in = table // form because it can theoretically support several languages. Never NU= LL. // EFI_UNICODE_STRING_TABLE *GopName; =20 // // GopHandle is the UEFI child handle that carries the device path ending // with the ACPI ADR node, and the Graphics Output Protocol. Never NULL. // EFI_HANDLE GopHandle; =20 // // The GopDevicePath field is the device path installed on GopHandle, // ending with an ACPI ADR node. Never NULL. // EFI_DEVICE_PATH_PROTOCOL *GopDevicePath; =20 // // The Gop field is installed on the child handle as Graphics Output Pro= tocol // interface. // EFI_GRAPHICS_OUTPUT_PROTOCOL Gop; =20 // // Referenced by Gop.Mode, GopMode provides a summary about the supported // graphics modes, and the current mode. // EFI_GRAPHICS_OUTPUT_PROTOCOL_MODE GopMode; =20 // // Referenced by GopMode.Info, GopModeInfo provides detailed information // about the current mode. // EFI_GRAPHICS_OUTPUT_MODE_INFORMATION GopModeInfo; =20 // // Identifier of the 2D host resource that is in use by this head (scano= ut) // of the VirtIo GPU device. Zero until the first successful -- internal= -- // Gop.SetMode() call, never zero afterwards. // UINT32 ResourceId; =20 // // A number of whole pages providing the backing store for the 2D host // resource identified by ResourceId above. NULL until the first success= ful // -- internal -- Gop.SetMode() call, never NULL afterwards. // UINT32 *BackingStore; UINTN NumberOfPages; + + // + // Token associated with BackingStore's mapping for bus master common + // buffer operation. BackingStoreMap is valid if, and only if, + // BackingStore is non-NULL. + // + VOID *BackingStoreMap; }; =20 // // VirtIo GPU initialization, and commands (primitives) for the GPU device. // /** Configure the VirtIo GPU device that underlies VgpuDev. =20 @param[in,out] VgpuDev The VGPU_DEV object to set up VirtIo messaging f= or. On input, the caller is responsible for having initialized VgpuDev->VirtIo. On output, VgpuDev-= >Ring has been initialized, and synchronous VirtIo GPU commands (primitives) can be submitted to the de= vice. =20 @retval EFI_SUCCESS VirtIo GPU configuration successful. =20 @retval EFI_UNSUPPORTED The host-side configuration of the VirtIo GPU i= s not supported by this driver. =20 @retval Error codes from underlying functions. **/ diff --git a/OvmfPkg/VirtioGpuDxe/Commands.c b/OvmfPkg/VirtioGpuDxe/Command= s.c index 595a3717d926..db5bdbca4bee 100644 --- a/OvmfPkg/VirtioGpuDxe/Commands.c +++ b/OvmfPkg/VirtioGpuDxe/Commands.c @@ -349,55 +349,76 @@ EFIAPI VirtioGpuExitBoot ( IN EFI_EVENT Event, IN VOID *Context ) { VGPU_DEV *VgpuDev; =20 VgpuDev =3D Context; VgpuDev->VirtIo->SetDeviceStatus (VgpuDev->VirtIo, 0); + + // + // If VirtioGpuDriverBindingStart() and VirtioGpuDriverBindingStop() have + // been called thus far in such a sequence that right now our (sole) chi= ld + // handle exists -- with the GOP on it standing for head (scanout) #0 --, + // then we have to unmap the current video mode's backing store. + // + if (VgpuDev->Child !=3D NULL) { + // + // The current video mode is guaranteed to have a valid and mapped bac= king + // store, due to the first Gop.SetMode() call, made internally in + // InitVgpuGop(). + // + ASSERT (VgpuDev->Child->BackingStore !=3D NULL); + + VgpuDev->VirtIo->UnmapSharedBuffer ( + VgpuDev->VirtIo, + VgpuDev->Child->BackingStoreMap + ); + } + VgpuDev->VirtIo->UnmapSharedBuffer (VgpuDev->VirtIo, VgpuDev->RingMap); } =20 /** Internal utility function that sends a request to the VirtIo GPU device model, awaits the answer from the host, and returns a status. =20 @param[in,out] VgpuDev The VGPU_DEV object that represents the VirtIo G= PU device. The caller is responsible to have successfully invoked VirtioGpuInit() on VgpuDev previously, while VirtioGpuUninit() must not have been called on VgpuDev. =20 @param[in] RequestType The type of the request. The caller is responsib= le for providing a VirtioGpuCmd* RequestType which,= on success, elicits a VirtioGpuRespOkNodata response from the host. =20 @param[in] Fence Whether to enable fencing for this request. Fenc= ing forces the host to complete the command before producing a response. If Fence is TRUE, then VgpuDev->FenceId is consumed, and incremented. =20 @param[in,out] Header Pointer to the caller-allocated request object. = The request must start with VIRTIO_GPU_CONTROL_HEADE= R. This function overwrites all fields of Header be= fore submitting the request to the host: =20 - it sets Type from RequestType, =20 - it sets Flags and FenceId based on Fence, =20 - it zeroes CtxId and Padding. =20 @param[in] RequestSize Size of the entire caller-allocated request obje= ct, including the leading VIRTIO_GPU_CONTROL_HEADER. =20 @retval EFI_SUCCESS Operation successful. =20 @retval EFI_DEVICE_ERROR The host rejected the request. The host e= rror code has been logged on the EFI_D_ERROR l= evel. =20 @return Codes for unexpected errors in VirtIo messaging, or request/response mapping/unmapping. **/ diff --git a/OvmfPkg/VirtioGpuDxe/Gop.c b/OvmfPkg/VirtioGpuDxe/Gop.c index 507e1a770d10..936e181e8a87 100644 --- a/OvmfPkg/VirtioGpuDxe/Gop.c +++ b/OvmfPkg/VirtioGpuDxe/Gop.c @@ -45,95 +45,101 @@ VOID ReleaseGopResources ( IN OUT VGPU_GOP *VgpuGop, IN BOOLEAN DisableHead ) { EFI_STATUS Status; =20 ASSERT (VgpuGop->ResourceId !=3D 0); ASSERT (VgpuGop->BackingStore !=3D NULL); =20 // // If any of the following host-side destruction steps fail, we can't ge= t out // of an inconsistent state, so we'll hang. In general errors in object // destruction can hardly be recovered from. // if (DisableHead) { // // Dissociate head (scanout) #0 from the currently used 2D host resour= ce, // by setting ResourceId=3D0 for it. // Status =3D VirtioGpuSetScanout ( VgpuGop->ParentBus, // VgpuDev 0, 0, 0, 0, // X, Y, Width, Height 0, // ScanoutId 0 // ResourceId ); // // HACK BEGINS HERE // // According to the GPU Device section of the VirtIo specification, the // above operation is valid: // // "The driver can use resource_id =3D 0 to disable a scanout." // // However, in practice QEMU does not allow us to disable head (scanou= t) #0 // -- it rejects the command with response code 0x1202 // (VIRTIO_GPU_RESP_ERR_INVALID_SCANOUT_ID). Looking at the QEMU source // code, function virtio_gpu_set_scanout() in "hw/display/virtio-gpu.c= ", // this appears fully intentional, despite not being documented in the // spec. // // Surprisingly, ignoring the error here, and proceeding to release // host-side resources that presumably underlie head (scanout) #0, work // without any problems -- the driver survives repeated "disconnect" / // "connect -r" commands in the UEFI shell. // // So, for now, let's just suppress the error. // Status =3D EFI_SUCCESS; // // HACK ENDS HERE // =20 ASSERT_EFI_ERROR (Status); if (EFI_ERROR (Status)) { CpuDeadLoop (); } } =20 // // Detach backing pages from the currently used 2D host resource. // Status =3D VirtioGpuResourceDetachBacking ( VgpuGop->ParentBus, // VgpuDev VgpuGop->ResourceId // ResourceId ); ASSERT_EFI_ERROR (Status); if (EFI_ERROR (Status)) { CpuDeadLoop (); } =20 // - // Release backing pages. + // Unmap and release backing pages. // - FreePages (VgpuGop->BackingStore, VgpuGop->NumberOfPages); + VirtioGpuUnmapAndFreeBackingStore ( + VgpuGop->ParentBus, // VgpuDev + VgpuGop->NumberOfPages, // NumberOfPages + VgpuGop->BackingStore, // HostAddress + VgpuGop->BackingStoreMap // Mapping + ); VgpuGop->BackingStore =3D NULL; VgpuGop->NumberOfPages =3D 0; + VgpuGop->BackingStoreMap =3D NULL; =20 // // Destroy the currently used 2D host resource. // Status =3D VirtioGpuResourceUnref ( VgpuGop->ParentBus, // VgpuDev VgpuGop->ResourceId // ResourceId ); ASSERT_EFI_ERROR (Status); if (EFI_ERROR (Status)) { CpuDeadLoop (); } VgpuGop->ResourceId =3D 0; } =20 // // The resolutions supported by this driver. // @@ -228,176 +234,182 @@ EFIAPI GopSetMode ( IN EFI_GRAPHICS_OUTPUT_PROTOCOL *This, IN UINT32 ModeNumber ) { - VGPU_GOP *VgpuGop; - UINT32 NewResourceId; - UINTN NewNumberOfBytes; - UINTN NewNumberOfPages; - VOID *NewBackingStore; + VGPU_GOP *VgpuGop; + UINT32 NewResourceId; + UINTN NewNumberOfBytes; + UINTN NewNumberOfPages; + VOID *NewBackingStore; + EFI_PHYSICAL_ADDRESS NewBackingStoreDeviceAddress; + VOID *NewBackingStoreMap; + EFI_STATUS Status; EFI_STATUS Status2; =20 if (ModeNumber >=3D ARRAY_SIZE (mGopResolutions)) { return EFI_UNSUPPORTED; } =20 VgpuGop =3D VGPU_GOP_FROM_GOP (This); =20 // // Distinguish the first (internal) call from the other (protocol consum= er) // calls. // if (VgpuGop->ResourceId =3D=3D 0) { // // Set up the Gop -> GopMode -> GopModeInfo pointer chain, and the oth= er // (nonzero) constant fields. // // No direct framebuffer access is supported, only Blt() is. // VgpuGop->Gop.Mode =3D &VgpuGop->GopMode; =20 VgpuGop->GopMode.MaxMode =3D (UINT32)(ARRAY_SIZE (mGopResoluti= ons)); VgpuGop->GopMode.Info =3D &VgpuGop->GopModeInfo; VgpuGop->GopMode.SizeOfInfo =3D sizeof VgpuGop->GopModeInfo; =20 VgpuGop->GopModeInfo.PixelFormat =3D PixelBltOnly; =20 // // This is the first time we create a host side resource. // NewResourceId =3D 1; } else { // // We already have an active host side resource. Create the new one wi= thout // interfering with the current one, so that we can cleanly bail out on // error, without disturbing the current graphics mode. // // The formula below will alternate between IDs 1 and 2. // NewResourceId =3D 3 - VgpuGop->ResourceId; } =20 // // Create the 2D host resource. // Status =3D VirtioGpuResourceCreate2d ( VgpuGop->ParentBus, // VgpuDev NewResourceId, // ResourceId VirtioGpuFormatB8G8R8X8Unorm, // Format mGopResolutions[ModeNumber].Width, // Width mGopResolutions[ModeNumber].Height // Height ); if (EFI_ERROR (Status)) { return Status; } =20 // - // Allocate guest backing store. + // Allocate, zero and map guest backing store, for bus master common buf= fer + // operation. // NewNumberOfBytes =3D mGopResolutions[ModeNumber].Width * mGopResolutions[ModeNumber].Height * sizeof (UINT32); NewNumberOfPages =3D EFI_SIZE_TO_PAGES (NewNumberOfBytes); - NewBackingStore =3D AllocatePages (NewNumberOfPages); - if (NewBackingStore =3D=3D NULL) { - Status =3D EFI_OUT_OF_RESOURCES; + Status =3D VirtioGpuAllocateZeroAndMapBackingStore ( + VgpuGop->ParentBus, // VgpuDev + NewNumberOfPages, // NumberOfPages + &NewBackingStore, // HostAddress + &NewBackingStoreDeviceAddress, // DeviceAddress + &NewBackingStoreMap // Mapping + ); + if (EFI_ERROR (Status)) { goto DestroyHostResource; } - // - // Fill visible part of backing store with black. - // - ZeroMem (NewBackingStore, NewNumberOfBytes); =20 // // Attach backing store to the host resource. // Status =3D VirtioGpuResourceAttachBacking ( VgpuGop->ParentBus, // VgpuDev NewResourceId, // ResourceId - (UINTN)NewBackingStore, // BackingStoreDeviceAddress + NewBackingStoreDeviceAddress, // BackingStoreDeviceAddress NewNumberOfPages // NumberOfPages ); if (EFI_ERROR (Status)) { - goto FreeBackingStore; + goto UnmapAndFreeBackingStore; } =20 // // Point head (scanout) #0 to the host resource. // Status =3D VirtioGpuSetScanout ( VgpuGop->ParentBus, // VgpuDev 0, // X 0, // Y mGopResolutions[ModeNumber].Width, // Width mGopResolutions[ModeNumber].Height, // Height 0, // ScanoutId NewResourceId // ResourceId ); if (EFI_ERROR (Status)) { goto DetachBackingStore; } =20 // // If this is not the first (i.e., internal) call, then we have to (a) f= lush // the new resource to head (scanout) #0, after having flipped the latte= r to // the former above, plus (b) release the old resources. // if (VgpuGop->ResourceId !=3D 0) { Status =3D VirtioGpuResourceFlush ( VgpuGop->ParentBus, // VgpuDev 0, // X 0, // Y mGopResolutions[ModeNumber].Width, // Width mGopResolutions[ModeNumber].Height, // Height NewResourceId // ResourceId ); if (EFI_ERROR (Status)) { // // Flip head (scanout) #0 back to the current resource. If this fail= s, we // cannot continue, as this error occurs on the error path and is // therefore non-recoverable. // Status2 =3D VirtioGpuSetScanout ( VgpuGop->ParentBus, // VgpuDev 0, // X 0, // Y mGopResolutions[This->Mode->Mode].Width, // Width mGopResolutions[This->Mode->Mode].Height, // Height 0, // ScanoutId VgpuGop->ResourceId // ResourceId ); ASSERT_EFI_ERROR (Status2); if (EFI_ERROR (Status2)) { CpuDeadLoop (); } goto DetachBackingStore; } =20 // // Flush successful; release the old resources (without disabling head // (scanout) #0). // ReleaseGopResources (VgpuGop, FALSE /* DisableHead */); } =20 // // This is either the first (internal) call when we have no old resources // yet, or we've changed the mode successfully and released the old // resources. // ASSERT (VgpuGop->ResourceId =3D=3D 0); ASSERT (VgpuGop->BackingStore =3D=3D NULL); =20 VgpuGop->ResourceId =3D NewResourceId; VgpuGop->BackingStore =3D NewBackingStore; VgpuGop->NumberOfPages =3D NewNumberOfPages; + VgpuGop->BackingStoreMap =3D NewBackingStoreMap; =20 // // Populate Mode and ModeInfo (mutable fields only). // VgpuGop->GopMode.Mode =3D ModeNumber; VgpuGop->GopModeInfo.HorizontalResolution =3D mGopResolutions[ModeNumber].W= idth; VgpuGop->GopModeInfo.VerticalResolution =3D mGopResolutions[ModeNumber].= Height; VgpuGop->GopModeInfo.PixelsPerScanLine =3D mGopResolutions[ModeNumber].W= idth; return EFI_SUCCESS; @@ -409,8 +421,13 @@ DetachBackingStore: CpuDeadLoop (); } =20 -FreeBackingStore: - FreePages (NewBackingStore, NewNumberOfPages); +UnmapAndFreeBackingStore: + VirtioGpuUnmapAndFreeBackingStore ( + VgpuGop->ParentBus, // VgpuDev + NewNumberOfPages, // NumberOfPages + NewBackingStore, // HostAddress + NewBackingStoreMap // Mapping + ); =20 DestroyHostResource: Status2 =3D VirtioGpuResourceUnref (VgpuGop->ParentBus, NewResourceId); --=20 2.14.1.3.gb7cf6e02401b _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel